Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Paul A. Wortman"'
Autor:
Paul A. Wortman, John A. Chandy
Publikováno v:
Discover Internet of Things, Vol 2, Iss 1, Pp 1-30 (2022)
Abstract Design and development of ubiquitous computer network systems has become increasingly difficult as technology continues to grow. From the introduction of new technologies to the discovery of existing threats, weaknesses, and vulnerabilities
Externí odkaz:
https://doaj.org/article/3cbc6c7af6ec4dc6b28d2fce4ea74579
Autor:
Paul A. Wortman, John A. Chandy
Publikováno v:
Journal of Cybersecurity. 6
As development and deployment of secure systems continue to grow at scale, there is an equal need to evaluate these systems for vulnerabilities and other problems. However, the process of evaluating these designs is complicated and mainly proprietary
Publikováno v:
IET Computers & Digital Techniques. 12:289-296
Continued growth and development in the consumer electronic market have greatly increased in the realm of home automation. With this swelling in smart, Internet-connected consumer electronics, there is a need to ensure the safe and secure use of thes
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 26:1084-1097
True random number generators (TRNGs) are central to many computing applications, particularly in security domains such as cryptography. In this paper, we consider the design and implementation of a low-cost and lightweight TRNG. In the interest of b
Autor:
John A. Chandy, Paul A. Wortman
Publikováno v:
Systems Engineering in Context ISBN: 9783030001131
As development and implementation of the Internet of Things (IoT) and embedded systems technologies increase, there is the need for a design framework that allows for thorough exploration of potential designs while detecting any potential risks and s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3f314484b29daf014f5b5f28e47f13bb
https://doi.org/10.1007/978-3-030-00114-8_39
https://doi.org/10.1007/978-3-030-00114-8_39
Publikováno v:
Cyber Security
Network architecture design and verification has become increasingly complicated as a greater number of security considerations, implementations, and factors are included in the design process. In the design process, one must account for various cost
Publikováno v:
ICCE
Nowadays, the consumer electronic (CE) market has grown to include smart devices for the Internet of Things. With increased adoption of these smart IoT devices, there is a high demand for safe and secure authentication for the purpose of maintaining
Publikováno v:
BHI
As the use of and reliance on IoT devices grows within the public domain, there is an equivalent dependence on due diligence taken to the design and development of IoT devices entering the medical and healthcare domains. Coupled with the growth of da
Publikováno v:
International Journal of Technology Assessment in Health Care. 14:109-122
A comparison of two assessment methods, consensus among experts and research synthesis of the scientific literature, was performed using a surgical procedure, carotid endarterectomy (CE), as an example. These two methods have been widely advocated as
Autor:
Paul M. Wortman, Anthony Napoli
Publikováno v:
Research in Higher Education. 39:419-455
The present study is based on the theoretical model of college retention developed by Tinto (1975, 1987, 1993) and subsequent validation efforts of others (Bers and Smith, 1991; Munro, 1981; Pascarella and Chapman, 1983a, b; Pascarella and Terenzini,